Tuesday, November 6

Test-driven development (TDD) is a powerful discipline that combines testing, coding, and software design to ameliorate defect rates and facilitate future enhancements. TDD has been around for some twenty years, so why isn’t it more prevalent—and more popular? For one thing, TDD is not easy to get right! And, it seems expensive. In this mostly hands-on tutorial, Rob Myers will explore these concerns by diving straight into the deep-end. Rather than starting with theory and working toward practice, Rob is going to reverse the tutorial recipe. Come prepared to spend the first half of...

Wednesday, November 7

Companies like Apple, Tesla, Google, Amazon, and Facebook have been investing in AI to solve different technological problems in the areas of health care, autonomous cars, search engines, predictive modeling, and much more. Applying AI is real, it’s coming fast, and it’s going to affect every business, no matter how big or small. How are testers going to adapt to this change and embrace AI? Join Raj Subramanian to discover how AI is going to influence the way we do test design and automation. He'll cover the basics of AI, the key ways software testing can benefit from AI, and the...

Thursday, November 8

Are parts of your organization embracing agile while others become more resistant, disconnected, or frustrated by the idea? Or maybe your team wants to be more agile but it isn’t sure how to get started because it’s not a typical development team. Agile has been moving out of software and being embraced by nondevelopment teams for years, but it’s not always a great experience. How can we make the best parts of agility relevant to any team? This hands-on session will show you how to start teams down the path to “being agile” by taking a teamwork-centered approach. With examples from a...

As IT shops look to move their workloads into containers and the cloud, their initial concerns often center around the security implications. Containers do force us to change how we think about securing our application, but they also offer exciting new opportunities. Curtis Yanko will explore the security concerns that come along with containers and take a deep dive into container composability and how modern tooling makes it possible to automate security and compliance concerns across the entire application stack. Curtis will share a project via GitHub that has a reference Jenkins...

Every one of us has the potential to be limitless in our careers, personal life, and everything in between! Yet most of us—yes, including you—are only achieving a fraction of what you are capable of. We all want more, but we aren’t sure how to go get it. This session will be an interactive and practical guide to breaking through all the things that limit you and will kickstart your journey to a limitless life. Jessica Soroky will introduce activities from the personal development program Limitless by Choice and address the potential all teams have to be high-performing when they start...

In the world of agile product development, user stories are like onions ... and no, that doesn’t mean they stink or they make you cry (although they have been known to do both). Writing user stories is still one of the hardest crafts in agile product development today. We all know that a good user story can be the difference between a low-performing Scrum team and a high-performing one. Katrina Thacker will introduce the "onion pattern" as a paradigm for creating great user stories, and she will lead you through a series of hands-on exercises to practice applying the pattern. In this...

Serverless architectures take the idea of microservices to the extreme. To implement secure serverless architectures, you have to understand how to compartmentalize programs at the function level. You also need to factor in security practices: Serverless architectures are susceptible to traditional attacks such as SQL injection and command injection, along with a wide variety of privilege escalation and sensitive data disclosure attacks. Developers must consider what would happen if an attacker attempted to invoke each of their functions directly. What if one of those functions were to...